Disclosures:
Professional Reviews

The reviews found on GuideHaven consist of evaluations conducted by community reviewers. These assessments take into account the reviewers’ unbiased and knowledgeable analysis of the products and services being reviewed.

Ownership

GuideHaven is a leading cybersecurity review website with a team of experts experienced in testing and evaluating VPNs, antiviruses, password managers, parental controls, and software tools. Our reviews are available in 29 languages, making them accessible to a broad audience since 2018. To further support our readers in their pursuit of online security, we’ve partnered with Kape Technologies PLC, which owns popular products like ExpressVPN, CyberGhost, ZenMate, Private Internet Access, and Intego, all of which may be reviewed on our website.

Affiliate Commissions

GuideHaven contains reviews that follow the strict reviewing standards, including ethical standards, that we have adopted. Such standards require that each review will take into consideration the independent, honest, and professional examination of the reviewer. That being said, we may earn a commission when a user completes an action using our links, at no additional cost to them. On listicle pages, we rank vendors based on a system that prioritizes the reviewer’s examination of each service, but also considers feedback received from our readers and our commercial agreements with providers.

Review Guidelines

The reviews published on GuideHaven are written by community reviewers that examine the products according to our strict reviewing standards. Such standards ensure that each review prioritizes the independent, professional, and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings we publish may also take into consideration the affiliate commissions we earn for purchases through links on our website.

News Heading

T-Mobile Denies Data Breach While Exposing Few Customer Data in a System Glitch

Shipra Sanganeria
Published by Shipra Sanganeria on September 26, 2024

Mobile telecom company, T-Mobile denied claims of being breached a third time this year. The incident came to light, when a threat actor going by the alias ’emo’ posted the leaked data on BreachForums for free.

The 90GB exfiltrated data posted on the hacking forum includes employee IDs, job titles, departments, rehire and termination dates, address, partial Social Security Numbers, email addresses, customer data, and other information.

However, T-Mobile has denied the alleged claim stating that the leaked data belongs to one of its authorized retailers. ‘’[..] The data being referred to online is believed to be related to an independently owned authorized retailer from their incident earlier this year. T-Mobile employee data was not exposed,’’ the company revealed.

By naming the post, ‘’T-Mobile | Connectivity Source (one of T-Mobile’s authorized retailers),’’ the hacker does connect the breach to both the companies; the post however claims the stolen data belongs to T-Mobile.

The news was first shared by malware researchers VX-Underground, who in tweets on X (formerly Twitter) claim the expose to be a result of T-Mobile’s April 2023, breach.

Over the years, the telecom giant has been breached several times. ‘’This is T-Mobile’s 8th breach since 2018,’’ VX-Underground states.

In addition to the hacking incident of last week, T-Mobile also suffered a system malfunction that accidentally exposed personal information of its customers. The breach was noticed when some customers complained about the issue on Reddit and X.

The posts mentioned that upon logging into the company’s app, customers could view other customers’ personal information, including plan and financial details. Regarding the incident, the company disclosed that the leak was due to an overnight update and involved less than 100 customers’ information.

Both the breach incidents either involve customer or employee information, which can be used by threat actors to commit financial frauds, send targeted phishing emails, or SMS messages.

Did you like this article? Rate it!
 
 
 
 
 
I hated it I don’t really like it It was ok Pretty good! Loved it!
0 Voted by 0 users
Title
Comment
Thanks for your feedback